|COWF WPA PSK Hash Tables with CowPatty 4.0|
|OHM2013: Breaking The Taboo (With QA) (film screening)|
Screening of cult film "Breaking the Taboo" - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation, Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals...
Keywords: OHM2013; talk; Amanda Fielding; Annie Machon; John Gilmore; screening; beckley foundation; LEAP; Law Enforcement Against Prohibition; prohibition; drug; drugs; narcotics
|Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized|
Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized http://www.irongeek.com/i.php?page=videos/intro-to-scanning-nmap-hping-amap-tcpdump-metasploit-jeremy-druin
Keywords: hacking; security
|BSides Las Vegas 2012|
Videos from Bsides Las Vegas 2012. Index at: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist
Keywords: hacking; security; bsides; las vegasf
|Traceroute and Scapy Jeremy Druin webpwnized|
Video tutorial from Jeremy Druin
Keywords: hacking; security; web
|Pen-testing practice in a box :How to assemble a virtual network|
http://www.irongeek.com/i.php?page=videos/pen-testing-practice-in-a-box-how-to-assemble-a-virtual-network This is a re-upload, the last one had audio issues Presenter: Jeremy Druin Topics Virtual Box Installation Installing virtual machines Configuring virtual networks - bridged, nat, hostonly USB devices in virtual machines Wireless networks in virtual machines Installing Guest Additions How to install Mutillidae in Windows on XAMPP How to install Mutillidae in Linux Samurai Video Tutorials: ww...
Keywords: hacking; mutillidae; owasp; security
|27c3-4087-en-console hacking 2010|
Console Hacking 2010 PS3 Epic Fail Over 70 million Wiis, over 40 million Xbox 360s and over 35 million Playstation 3s have been sold in the last few years. That makes over 145 million embedded devices out there and most of them are just used to play games. But what can you do with them if you don't like playing games? You hack them to make them run your own code of course! We're going to talk about the various hacks that you can use to gain control of your hardware and make it do what you want i...
|The Best of DEFCON 7 (HNC Network)|
Immortality Video Presents: The Best of Defcon 7. A production by the HNC Network. Documentary released in 1999 of the DEFCON 7 Hacking Conference. Sequences include: Extended Interview with Jeff Moss (The Dark Tangent), Sumo Wrestling, Extended Interview with Noid, Hacker Jeopardy, Say Hello to HackCanada, Interview with Random Hackers, Extended Interview with the NightStalker, Say Hello to Space Rogue, Say Hello to Kevin Poulsen, Cult of the Dead Cow Release BO2K...
|PhreakNIC 16 (2012)|
PhreakNIC 16 (2012) Videos
Keywords: phreaknic; hacking; security
|Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC) - Adrian Crenshaw|
Demo video on Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC)
Keywords: OpenSSL; AES 128; ECB; CBC
|Hack3rcon 3 (2012)|
Videos of the talks from Hack3rcon 3 (2012)
Keywords: hacking; security; hack3rcon
Keywords: SkyDogCon; nashville; hacking; security
|Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2|
Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2 from Jeremy Druin
Keywords: hacking; security. owasp; pen-testing
|136 Hacking Linux-Powered Devices|
136 Hacking Linux-Powered Devices
Keywords: root; lrwxrwxrwx; kernel; suspects; usual; linux; cramfs; embedded; firmware; image; root root; usual suspects; firmware image; file system
|OHM2013: Julian Assange - Wikileaks Fights On|
How is Wikileaks dealing with the assault against it and what new leaks it is making available to the world. Wikileaks founder Jullian Assange will be speaking over video link from the Equadorian Embassy in London.Presenter: Julian Assangehttps://program.ohm2013.org/event/324.html Day 1 Start time 22:00 Duration 1:00 Location T1: Orwell Hall Type Lecture Track Observe
Keywords: OHM2013; wikileaks; julian assange
Downloads: 50 (1 review)
|Deepsec 2009 Video - Deepsec|
Videos from Deepsec 2009.
Keywords: deepsec; hacker; conference; hacking
|Open Source Intelligence: Data Patterns on the WWW - Valdis Krebs|
Valdis will present his work in "open source intelligence" -- finding interesting data and patterns on the WWW and making sense of them. He will explain how he used the web to create various network analyses with purely public information. * 9/11 hijackers, their supporters, and their connections * book buying patterns on Amazon * economic development community in NE Ohio * the blogosphere in NE Ohio Valdis will explain a simple method to follow in tracking web data and how Google is the only re...
Downloads: 40 (1 review)
|SQL Server Hacking By Jeremy Druin|
SQL Server Hacking By Jeremy Druin as recorded as the Kentuckiana ISSA/
Keywords: sql; hacking; louisville
|Derbycon 2012 Day 3|
Derbycon 2012 Day 3
Keywords: derbycon; hacking; security; louisville
dojocon, hacking, security http://Dojocon.org http://hackerspaces.org/wiki/Reverse_Space Tiffany Strauchs Rad, @tiffanyrad International Cyber Jurisdiction: âKill Switchingâ Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs Security and IT Convergence Richard Goldberg, @GoldbergLawDC Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa Detecting & Defending You Network...
Keywords: dojocon; hacking; security
|ShmooCon Epilogue 2012|
ShmooCon Epilogue 2012
Keywords: security; hacking; cyber
|OHM2013: RFguy - Masterkey Systems in private, industry and public infrastructure|
A View about mechanical/electronic Masterkey Systems that use at your home, in comercial installations and even critical public infrastructure. Analyse of possible attaks and masterkey generation. Take a view to the technical Background of mechanic and electronic Masterkey Systems. A detailed view different Variants of mechanical construction of these systems, advance and disadvance. Generation of the Masterkey without knowing it's mechanical data, defeats the security of obscurity, what is the ...
Keywords: OHM2013; talk; security; masterkey; RFguy
|A Post-Crash Tech Start-Up in Ohio - John Bellinger|
Many geeks dream of ditching the drudgery of a "real job" and striking out on their own. It is actually possible to pull off, even in Akron Ohio. This talk will touch on my experiences starting and running a company that designs and manufactures robot electronics. With topic headings like "Mom, Dad, I'm back!", "Honey, I'm leaving you," and "Are we rich yet?", the grim realities and shimmering possibilities of running a tech startup will be discussed...
|One Last Time: The Hacking/Phreaking History Primer - Jason Scott Sadofsky|
Presented at The Last Hope, Hotel Pennsylvania, New York City, NY. Historian Jason Scott covers a broad range of hacker history subjects, focusing on providing the tools for understanding the context of hacking and computer history. Subjects covered include 1800-era hacker cons, myths in the Hacker "story", names and events likely forgotten, and some of the touchstones of what hackers consider their lore.
Keywords: Hacking; phreaking; jason scott
|Do it yourself: Building an Enterprise Class Surveillance System - Joel Wilbanks|
Building an enterprise class surveillance system (ECSS) is not as complicated as it sounds. Constructing a system with all the bells and whistles only takes a desire to save the company money and the ability to research and evaluate products currently available in the industry. In January 2004 I proved this theory by constructing an effective ECSS without any prior knowledge of surveillance. From inception to project completion, there were several security companies (some VERY large and well kno...
|Building Character: ANSI From the Ground Up - Christian 'RaD Man' Wirth|
With limitations in color, character set and size, the ANSI artscene still found ways to innovate, flourish and reach amazing heights in the last 25 years. Starting with a brief history of pre-ANSI character art, RaD Man of ACiD describes the problems and solutions of working in a text-based medium, lessons which will crop up again and again working with computers and scant resources in relation to art...
|H2K4 - Building Hacker Spaces Excerpts - Jason Scott Sadofsky|
Collection of footage shot during the "Building Hacker Spaces" presentation at the Hackers on Planet Earth (HOPE) Conference in New York City. Mostly focuses on the personalities present both in the audience and onstage than the content of the speech; meant to provide alternate angles from MP3s and video footage, although not ultimately used. Not used in the BBS Documentary, ultimately.
Keywords: Hope; hackers; h2k4; 2600; bbs; documentary
|OHM2013: Karnei Gozman - Introduction to Quantum Perturbation|
A birds eye view of the diagrammatic representation of Rayleigh-Schrödinger Perturbation Theory(RSPT), a general formula for generating perturbed calculations. plus a a brief, mostly inaccurate introduction to programing for quantum computers. Quantum computation requires a different type of calculation unlike current modern day stochastic analysis. Rayleigh-Schrödinger Perturbation Theory is a good place to start thinking about where this new computation could lead us.Program event page: htt...
Keywords: OHM2013; talk; Karnei Gozman; quantum perturbation; RSPT; Rayleigh-Schrödinger Perturbation Theory; quantum computation
|Outerz0ne 8 (2012)|
Videos from Outerz0ne 8 (2012).
Keywords: hacking; security; con; Outerz0ne
|2007 BlackHat Vegas-V48-Hoagland-Vista Network Attack-Teredo.mp4|
2007 BlackHat Vegas-V48-Hoagland-Vista Network Attack-Teredo.mp4
|Schmoocon 2014 Videos List|
Shmoo 2014 Vids List.
Keywords: tracker; video; data; hackers; cryptography; forensics; defenses; usb; kang; miller; video completion; completion tracker
|Bsides Cleveland 2012 BsidesCLE|
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
Keywords: security; hacking
Downloads: 997 (1 review)
|DeepSec 2007 Audio - DeepSec|
RPC Auditing Tools and Techniques Aaron Portnoy, Cody Pierce, TippingPoint Security Research Team RPC auditing is currently a tedious and manual process. When complex embedded structures, arrays, and unions are present in an IDL, coding the client involves much debugging and time. The discussed tools are the culmination of a few weeks worth of research performed by Aaron Portnoy and Cody Pierce that allow a researcher to very quickly be able to communicate and audit an RPC server...
Keywords: deepsec; hacker; conference; anarchivism
|2007 BlackHat Vegas-V31-Sotirov-Heap Feng Shui.mp4|
2007 BlackHat Vegas-V31-Sotirov-Heap Feng Shui.mp4
|OHM2013: Guy Martin - Real time network forensics using pom-ng|
Networks are part of our daily life. A lot of information transit through them but few really know what is actually transmitted and what information can be extracted. This talk will present pom-ng, a network forensic tool that performs real time analysis. The talk will focus on describing the coding challenges faced with such tool, architecture and what can be done with it. The talk will be split in 3 parts...
Keywords: OHM2013; talk; Guy Martin; lua; pom-ng; real time; network forensics; forensics; IP; de-fragmentation; TCP; TCP re-ordering; DNS caching; DNS
|Breaking LANMAN Forever - Dan Moniz and Patrick Stach|
In late 2004, a few Shmoo, at the suggestion of Beetle, started working in earnest on using RainbowCrack to generate the entirety of the LanMan keyspace, with the intent of breaking LanMan once and for all. Chief in this was work done by snax and Dan Moniz, who pooled around 120 CPUs combined at the high point of the collaboration to run rtgen jobs to build the datasets, which was completed by ShmooCon 2005...
|Network Security Monitoring with Sguil - Richard Bejtlich|
This talk will introduce the open source network security monitoring suite called Sguil (www.sguil.net). Sguil is a Tcl/Tk interface to alert data from Snort, session data from the Security Analyst Network Connection Profiler (SANCP), and full content data from Tcpdump or a second instance of Snort. Sguil is unlike any Web-based alert GUI used to perform so-called "analysis" of Snort alerts, like ACID or BASE...
Keywords: Shmoocon; 2006; Richard Bejtlich; Network Security Monitoring
|Reverse Engineering for Fun and BoF It! - Pedram Amini and Chris Eagle|
Reverse engineering (RE) skills are handy in a number of situations. Determining the behavior of malware, discovery of software vulnerabilities and showing off to your friends are just a few of the benefits that immediately come to mind. Unfortunately reverse engineers are mostly self trained, work in solitude and do not openly work together when developing tools and techniques. This goal of this session is to present some of our ideas and tools (past, present and future) to foster an open discu...
Keywords: Shmoocon; 2006; Chris Eagle; Pedram Amini; Reverse Engineering
|2007 BlackHat Vegas-V20-Lindsay-Attacking Windows Kernel.mp4|
2007 BlackHat Vegas-V20-Lindsay-Attacking Windows Kernel.mp4
|2007 BlackHat Vegas-V40-Fowler-SQL Server Database Forensics.mp4|
2007 BlackHat Vegas-V40-Fowler-SQL Server Database Forensics.mp4
|VoIP WiFi phone security analysis - Shawn Merdinger|
This presentation will be a continuation of my presentation at 32nd CSI. My presentation for ShmooCon will build on the Level one analysis outlined at CSI to include more attacks and threat analysis (i.e. Levels two and Level three). Shawn Merdinger is a security researcher based in Austin, Texas. He is currently employed by TippingPoint, a division of 3Com, where he conducts VoIP security analysis...
|Attacking Interoperability - Mark Dowd|
|OHM2013: Jeroen van der Ham - Testing Mobile Netneutrality|
KPN and others are violating the Dutch Netneutrality laws. Learn how we found out and how you can help too! The Internet Society Netherlands has a working group looking at the transparency of the Internet. In this group we already looked critically at the PirateBay website blockade, and we have created an app to test the openness of your Internet connection. In this talk I describe how we further confirmed results from the app...
Keywords: OHM2013; talk; Jeroen van der Ham; mobile; network neutrality; neutrality; testing; Internet Society Netherlands; the pirate bay; pirate bay
|OHM2013: Tim Becker - Another Rambling About EMV|
A brief introduction to EMV, the protocol spoken between smart card based credit cards and terminals. A mixture of plastic and RF, bits, bytes and anecdotes, based around a single payment transaction performed live on stage. My talk will be an introduction helping beginners to start playing around with (chip based & contactless) credit cards and provide some deeper insight for people with knowledge of chip card but little knowledge of EMV...
Keywords: OHM2013; talk; EMV; Tim Becker; Chip&PIN; visa; mastercard; 29C3
|Network Forensics - Meling Mudin and CS Lee|
|Kryptos and the Cyrillic Projector Cipher - Elonka Dunin|
In a courtyard at CIA Headquarters stands an encrypted sculpture called Kryptos. Its thousands of characters contain encoded messages, three of which have been solved. The fourth part, 97 or 98 characters at the very bottom, have withstood cryptanalysis for over a decade. The artist who created Kryptos, James Sanborn, has also created other encrypted sculptures such as the decade-old Cyrillic Projector, which was cracked in 2003 by an international team led by Elonka Dunin...
|130 Physical Security|
130 Physical Security
Keywords: seiden; access; security; sensors; acoustic; doors; locks; controls; key; mark seiden; physical security; key pressed; access control; seiden physical; magnetic strikes
|2007 BlackHat Vegas-V62-Belani-Jones-Smoke em Out.mp4|
2007 BlackHat Vegas-V62-Belani-Jones-Smoke em Out.mp4
|Implementing a Blind TCPIP Hijacking Tool - Kuza55|
|OHM2013: Merlijn Wajer - Hart Voor Internetvrijheid|
"Hart voor internetvrijheid" is a foundation setup to help in circumventing censorship online. Our primary goal is to run a bunch of Tor nodes. We are a partner at; https://www.torservers.net/partners.html
Keywords: OHM2013; talk; lightning talk; Merlijn Wajer; Hart voor internetvrijheid; TOR; The Onion Router; censorship